SlideShare a Scribd company logo
Empower
Enterprise
Mobility
RICHARD
HARBRIDGE
My twitter handle is @RHarbridge, my blog is http://RHarbridge.com, and I work at
SPEAKER | AUTHOR | SUPER FRIENDLY
Microsoft Cloud
Platform CUSTOMER
DATACENTER
SERVICE
PROVIDER
MICROSOFT
AZURE
CONSISTENT
PLATFORM
• Global scale
• Enterprise-grade
• Comprehensive
• Hybrid cloud
• People-centered
experiences
of employees use personal
devices for work purposes.*
of employees that typically
work on employer premises,
also frequently work away
from their desks.***
of all software will be available
on a SaaS delivery by 2020.**
66% 25% 33%
*CEB The Future of Corporate ITL: 203-2017. 2013.
**Forrester Application Adoption Trends: The Rise Of SaaS
***CEB IT Impact Report: Five Key Findings on Driving Employee Productivity Q1 2014.
Devices Apps Data
Cost
Risk
Change drives complexity
VDI Solutions
Data Security Solutions
MDM Solutions
System Center
ID Solutions
?
?
?
?
?
New Solution
Cost
Risk
Cost
Risk
Cost
Risk
Cost
Risk
ComplexityComplexityComplexityComplexityComplexityComplexity
Cost
Risk
?
Microsoft’s unified approach
Cost
Risk
Complexity
Progress
Protect
your data
Enable
your users Unify your environment
People-centric approach
Devices Apps Data
Protect
your data
Enable
your users
Mobile device &
application
management
Access &
information
protection
Hybrid
identity
Desktop
Virtualization
Making it easier to deliver
a great brand experience
Keeping the selling workforce
productive
Bringing a new level of
efficiency to management (2
for 20,000)
Single sign-on
Self-service experiences
Common identity
Conditional access
SaaS applications
Mobile device &
application
management
Access &
information
protection
Desktop
Virtualization
Hybrid
identity
“We deal with sensitive government
contracts, so we need to ensure the
security of our data. We watch our
mobile devices very carefully, and having
security reporting like this built into our
directory system is great.”
Patrick Wirtz
Innovation Manager
The Walsh Group
A rendering of the new Tom Bradley International Terminal’s great hall. (credit: Los Angeles World Airports)
User’s identity
•••••••••••••
User’s identity
•••••••••••••
Username
?
ITUser
Cloud
On-premises
User’s identity
•••••••••••••
Username
?
New app
Identity layer
ITUser
On-premises
User’s identity
•••••••••••••
Username
•••••••••••••
ITUser
Cloud
On-premises
User’s identity
•••••••••••••
Username
?
Forgot your password?
ITUser
Cloud
On-premises
User’s identity
•••••••••••••
New device
ITUser
Cloud
On-premises
Policy control
SaaS discovery
User’s identity
ITUser
Cloud
On-premises
Enriched user experience through a single, verified identity
Unified across cloud and on-premises with single sign-on
Integrated identity solution reduces risk across the business
Reduced IT burden of creating and managing multiple identities
@RHarbridge
@RHarbridge
@RHarbridge
@RHarbridge
@RHarbridge
@RHarbridge
@RHarbridge
Mobile device &
application
management
Access &
information
protection
Desktop
Virtualization
Hybrid
identity
Managed productivity with Office mobile apps
Mobile app management and app wrapping
Conditional access to corporate resources
Simplified device enrollment
“By using [Microsoft] Intune, we can
improve staff members’ work experience
and guest satisfaction, while reducing IT
labor and operational costs. Everyone
wins.”
Tim Banham
Solution Architect
Mitchells & Butlers
ITUser
Device
enrolled
Apply policies
Company Portal
Recommended apps for the user’s devices
ITUser
User IT
Maximize mobile productivity and protect corporate
resources with Office mobile apps
Extend these capabilities to existing line-of-business
apps using the Intune app wrapper
Enable secure viewing of content using the Managed
Browser, PDF Viewer, AV Player, and Image Viewer apps
Managed apps
Personal appsPersonal apps
Managed apps
Personal apps
Managed apps
User
Maximize productivity while preventing leakage of company
data by restricting actions such as copy/cut/paste/save in
your managed app ecosystem
Personal apps
Managed apps
Company Portal
Are you sure you want to wipe
corporate data and applications
from User’s device?
OK Cancel
IT
Perform selective wipe via self-service company portal or admin console
Remove managed apps and data
Keep personal apps and data intact
Managed apps
Consistent user experience across device platforms
Secure access to corporate apps and data
Single management console for mobile devices and PCs
@RHarbridge
@RHarbridge
@RHarbridge
@RHarbridge
@RHarbridge
@RHarbridge
http://blogs.technet.com/b/microsoftintune/archive/2014/12/03/conditional-access-
for-on-premises-exchange-using-microsoft-intune.aspx
Mobile device &
application
management
Access &
information
protection
Desktop
Virtualization
Hybrid
identity
Dynamic Access Control
Rights management
Secure access to work files
“Anywhere we can improve our access
control mechanism would help us keep our
data secure and comply with aviation
industry and government regulations.”
Martin Gallington
Senior Vice President of IT
Menzies Aviation
ITUser
ITUser
ITUser
ITUser
ITUser
v
v
ITUser
Keep corporate data secure
Manage the data, not the user
Provide access to data on any trusted device
@RHarbridge
@RHarbridge
@RHarbridge
@RHarbridge
@RHarbridge
@RHarbridge
Mobile device &
application
management
Access &
information
protection
Desktop
Virtualization
Hybrid
identity
Rich user experience
Efficient management
Information protection
“We hope to use Windows Server 2012 to
expand VDI from 200 users to about 1,000
users in the next few months …. This will
enable more employees to work from home
and give them more flexibility.”
Eduard Martin
Assistant Vice President
Chief Technology Officer,
City of Barcelona
ITUser
ITUser
ITUser
ITUser
ITUser
Provide users with access to data from any trusted device
Centralize and manage corporate resources efficiently
Protect corporate desktops and applications
@RHarbridge
@RHarbridge
Devices Apps Data
Management. Access control. Information protection.
66%of enterprise seats
covered with System
Center Configuration
Manager
240muser accounts in Microsoft
Azure Active Directory
…lets you build on your investments
14B+Microsoft Azure Active
Directory authentications
per week
Thank You!
Organizers, SponsorsandYouformakingthispossible.
100+PresentationsAt.. Slideshare.Net/RHarbridge
TrialEnterpriseMobility.. http://bit.ly/EMSTrials
EADiscount/SpecialOffer.. Contact MS Account Manager
RequestanEMSPOC&DPSDaysifyouhaveSoftwareAssurance…
Message Me On LinkedIn or Email Richard@2toLead.com
My twitter handle is @RHarbridge, my blog is http://RHarbridge.com, and I work at
SPEAKER | AUTHOR | SUPER FRIENDLY

More Related Content

What's hot

Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
Primend
 
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft
 
IAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - PresentationIAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - Presentation
Jon Stevens-Hall
 
Empower Your Organization with Microsoft Power Platform
Empower Your Organization with Microsoft Power PlatformEmpower Your Organization with Microsoft Power Platform
Empower Your Organization with Microsoft Power Platform
David J Rosenthal
 
Melbourne Office 365 User Group - February 2015
Melbourne Office 365 User Group - February 2015Melbourne Office 365 User Group - February 2015
Melbourne Office 365 User Group - February 2015
Michael Frank
 
Microsoft Azure Overview
Microsoft Azure OverviewMicrosoft Azure Overview
Microsoft Azure Overview
David J Rosenthal
 
Cloud computing in Thailand
Cloud computing in ThailandCloud computing in Thailand
Cloud computing in ThailandValiente Veera
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in Thailand
IMC Institute
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
Tableau Software
 
Libera la potenza del Machine Learning
Libera la potenza del Machine LearningLibera la potenza del Machine Learning
Libera la potenza del Machine Learning
Jürgen Ambrosi
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
Citrix
 
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Jon Stevens-Hall
 
IBM Systems of Interaction
IBM Systems of InteractionIBM Systems of Interaction
IBM Systems of Interaction
IBM Sverige
 
Chapter 06: cloud computing trends
Chapter 06: cloud computing trendsChapter 06: cloud computing trends
Chapter 06: cloud computing trends
SsendiSamuel
 
Cloud and big data
Cloud and big data Cloud and big data
Cloud and big data
BALAJIK155
 
Securing and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobileSecuring and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobile
Citrix
 
Office365 Saturday - Redmond - 7 SharePoint Online Success Factors
Office365 Saturday - Redmond - 7 SharePoint Online Success FactorsOffice365 Saturday - Redmond - 7 SharePoint Online Success Factors
Office365 Saturday - Redmond - 7 SharePoint Online Success FactorsRichard Harbridge
 
How the Internet of Things and 20 billion devices will change your job
How the Internet of Things and 20 billion devices will change your jobHow the Internet of Things and 20 billion devices will change your job
How the Internet of Things and 20 billion devices will change your job
Jon Stevens-Hall
 
New Emerging Technology Wave Ppt
New Emerging Technology  Wave PptNew Emerging Technology  Wave Ppt
New Emerging Technology Wave Ppt
Synergetics India
 

What's hot (20)

Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
 
IAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - PresentationIAITAM ACE 2016, New Orleans - Presentation
IAITAM ACE 2016, New Orleans - Presentation
 
Empower Your Organization with Microsoft Power Platform
Empower Your Organization with Microsoft Power PlatformEmpower Your Organization with Microsoft Power Platform
Empower Your Organization with Microsoft Power Platform
 
Melbourne Office 365 User Group - February 2015
Melbourne Office 365 User Group - February 2015Melbourne Office 365 User Group - February 2015
Melbourne Office 365 User Group - February 2015
 
Microsoft Azure Overview
Microsoft Azure OverviewMicrosoft Azure Overview
Microsoft Azure Overview
 
Cloud computing in Thailand
Cloud computing in ThailandCloud computing in Thailand
Cloud computing in Thailand
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in Thailand
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 
Libera la potenza del Machine Learning
Libera la potenza del Machine LearningLibera la potenza del Machine Learning
Libera la potenza del Machine Learning
 
Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
 
Performance Evaluation of Virtualization Technologies for Server
Performance Evaluation of Virtualization Technologies for ServerPerformance Evaluation of Virtualization Technologies for Server
Performance Evaluation of Virtualization Technologies for Server
 
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
 
IBM Systems of Interaction
IBM Systems of InteractionIBM Systems of Interaction
IBM Systems of Interaction
 
Chapter 06: cloud computing trends
Chapter 06: cloud computing trendsChapter 06: cloud computing trends
Chapter 06: cloud computing trends
 
Cloud and big data
Cloud and big data Cloud and big data
Cloud and big data
 
Securing and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobileSecuring and Managing Offce 365 with XenMobile
Securing and Managing Offce 365 with XenMobile
 
Office365 Saturday - Redmond - 7 SharePoint Online Success Factors
Office365 Saturday - Redmond - 7 SharePoint Online Success FactorsOffice365 Saturday - Redmond - 7 SharePoint Online Success Factors
Office365 Saturday - Redmond - 7 SharePoint Online Success Factors
 
How the Internet of Things and 20 billion devices will change your job
How the Internet of Things and 20 billion devices will change your jobHow the Internet of Things and 20 billion devices will change your job
How the Internet of Things and 20 billion devices will change your job
 
New Emerging Technology Wave Ppt
New Emerging Technology  Wave PptNew Emerging Technology  Wave Ppt
New Emerging Technology Wave Ppt
 

Similar to Enterprise Mobility: Microsoft Cloud OS Roadshow

2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing
Scott Cameron
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityIngram Micro Cloud
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
Ashvin Dixit
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
Peter De Tender
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
gule mariam
 
Brainstorm:KC 2016
Brainstorm:KC 2016Brainstorm:KC 2016
Brainstorm:KC 2016
Scott Cameron
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
RapidValue
 
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)Microsoft Norge AS
 
Enabling the digital workspace
Enabling the digital workspaceEnabling the digital workspace
Enabling the digital workspace
Peter Ward
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Tim Harvey
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
IBM Security
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Community IT - Single Sign On
Community IT - Single Sign OnCommunity IT - Single Sign On
Community IT - Single Sign On
Community IT Innovators
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
HaekalAufar1
 

Similar to Enterprise Mobility: Microsoft Cloud OS Roadshow (20)

2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing2016 Cloud Unbound Briefing
2016 Cloud Unbound Briefing
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
 
05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx05-Empowering-Enterprise-Mobility-FR.pptx
05-Empowering-Enterprise-Mobility-FR.pptx
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)Ibm mobile first protect (maas360)
Ibm mobile first protect (maas360)
 
Brainstorm:KC 2016
Brainstorm:KC 2016Brainstorm:KC 2016
Brainstorm:KC 2016
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
Med Hodet I Skyene Og Beina På Bakken (Av Andersf@Microsoft Com)
 
Enabling the digital workspace
Enabling the digital workspaceEnabling the digital workspace
Enabling the digital workspace
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Community IT - Single Sign On
Community IT - Single Sign OnCommunity IT - Single Sign On
Community IT - Single Sign On
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
 

More from Richard Harbridge

Piloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Richard Harbridge
 
Preparing, Piloting & Paths to Success with Microsoft Copilot
Preparing, Piloting & Paths to Success with Microsoft CopilotPreparing, Piloting & Paths to Success with Microsoft Copilot
Preparing, Piloting & Paths to Success with Microsoft Copilot
Richard Harbridge
 
Bridging The Gap: How AI Is Transforming Both Customer Experience & Employee ...
Bridging The Gap: How AI Is Transforming Both Customer Experience & Employee ...Bridging The Gap: How AI Is Transforming Both Customer Experience & Employee ...
Bridging The Gap: How AI Is Transforming Both Customer Experience & Employee ...
Richard Harbridge
 
Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow
Getting The Most Out Of Microsoft 365 Employee Experience Today & TomorrowGetting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow
Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow
Richard Harbridge
 
Mastering Microsoft 365: The Winning Trio Of Automation, Governance & Adoption
Mastering Microsoft 365: The Winning Trio Of Automation, Governance & AdoptionMastering Microsoft 365: The Winning Trio Of Automation, Governance & Adoption
Mastering Microsoft 365: The Winning Trio Of Automation, Governance & Adoption
Richard Harbridge
 
Piloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Richard Harbridge
 
Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow SH...
Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow SH...Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow SH...
Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow SH...
Richard Harbridge
 
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
Richard Harbridge
 
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Rec...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Rec...Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Rec...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Rec...
Richard Harbridge
 
Metaverse & The Employee Experience: What You Need To Know
Metaverse & The Employee Experience: What You Need To KnowMetaverse & The Employee Experience: What You Need To Know
Metaverse & The Employee Experience: What You Need To Know
Richard Harbridge
 
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
Richard Harbridge
 
Ideas & Inspiration: Getting Started & Driving Success With Power Platform At...
Ideas & Inspiration: Getting Started & Driving Success With Power Platform At...Ideas & Inspiration: Getting Started & Driving Success With Power Platform At...
Ideas & Inspiration: Getting Started & Driving Success With Power Platform At...
Richard Harbridge
 
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...
Richard Harbridge
 
Tackling Employee Experience Today As We Embrace The Future Workplace
Tackling Employee Experience Today As We Embrace The Future WorkplaceTackling Employee Experience Today As We Embrace The Future Workplace
Tackling Employee Experience Today As We Embrace The Future Workplace
Richard Harbridge
 
Smarter, Not Harder How AI Is Changing Communication - Ragan Events
Smarter, Not Harder How AI Is Changing Communication - Ragan EventsSmarter, Not Harder How AI Is Changing Communication - Ragan Events
Smarter, Not Harder How AI Is Changing Communication - Ragan Events
Richard Harbridge
 
Enhancing Microsoft Teams To Build A Better Digital Workplace
Enhancing Microsoft Teams To Build A Better Digital WorkplaceEnhancing Microsoft Teams To Build A Better Digital Workplace
Enhancing Microsoft Teams To Build A Better Digital Workplace
Richard Harbridge
 
Masterclass On Improving & Measuring Onboarding, Retention & Wellbeing With M...
Masterclass On Improving & Measuring Onboarding, Retention & Wellbeing With M...Masterclass On Improving & Measuring Onboarding, Retention & Wellbeing With M...
Masterclass On Improving & Measuring Onboarding, Retention & Wellbeing With M...
Richard Harbridge
 
Getting Started & Driving Success With Power Platform At Scale
Getting Started & Driving Success With Power Platform At ScaleGetting Started & Driving Success With Power Platform At Scale
Getting Started & Driving Success With Power Platform At Scale
Richard Harbridge
 
Masterclass On Improving & Measuring Onboarding, Retention & Well-being
Masterclass On Improving & Measuring Onboarding, Retention & Well-beingMasterclass On Improving & Measuring Onboarding, Retention & Well-being
Masterclass On Improving & Measuring Onboarding, Retention & Well-being
Richard Harbridge
 
Piloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Richard Harbridge
 

More from Richard Harbridge (20)

Piloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
 
Preparing, Piloting & Paths to Success with Microsoft Copilot
Preparing, Piloting & Paths to Success with Microsoft CopilotPreparing, Piloting & Paths to Success with Microsoft Copilot
Preparing, Piloting & Paths to Success with Microsoft Copilot
 
Bridging The Gap: How AI Is Transforming Both Customer Experience & Employee ...
Bridging The Gap: How AI Is Transforming Both Customer Experience & Employee ...Bridging The Gap: How AI Is Transforming Both Customer Experience & Employee ...
Bridging The Gap: How AI Is Transforming Both Customer Experience & Employee ...
 
Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow
Getting The Most Out Of Microsoft 365 Employee Experience Today & TomorrowGetting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow
Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow
 
Mastering Microsoft 365: The Winning Trio Of Automation, Governance & Adoption
Mastering Microsoft 365: The Winning Trio Of Automation, Governance & AdoptionMastering Microsoft 365: The Winning Trio Of Automation, Governance & Adoption
Mastering Microsoft 365: The Winning Trio Of Automation, Governance & Adoption
 
Piloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
 
Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow SH...
Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow SH...Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow SH...
Getting The Most Out Of Microsoft 365 Employee Experience Today & Tomorrow SH...
 
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
 
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Rec...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Rec...Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Rec...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Rec...
 
Metaverse & The Employee Experience: What You Need To Know
Metaverse & The Employee Experience: What You Need To KnowMetaverse & The Employee Experience: What You Need To Know
Metaverse & The Employee Experience: What You Need To Know
 
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
Elevate Your Microsoft 365 Experience The Winning Trio Of AI, Analytics & Aut...
 
Ideas & Inspiration: Getting Started & Driving Success With Power Platform At...
Ideas & Inspiration: Getting Started & Driving Success With Power Platform At...Ideas & Inspiration: Getting Started & Driving Success With Power Platform At...
Ideas & Inspiration: Getting Started & Driving Success With Power Platform At...
 
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...
Smarter, Not Harder How AI Is Changing Employee Experience - Reworked Connect...
 
Tackling Employee Experience Today As We Embrace The Future Workplace
Tackling Employee Experience Today As We Embrace The Future WorkplaceTackling Employee Experience Today As We Embrace The Future Workplace
Tackling Employee Experience Today As We Embrace The Future Workplace
 
Smarter, Not Harder How AI Is Changing Communication - Ragan Events
Smarter, Not Harder How AI Is Changing Communication - Ragan EventsSmarter, Not Harder How AI Is Changing Communication - Ragan Events
Smarter, Not Harder How AI Is Changing Communication - Ragan Events
 
Enhancing Microsoft Teams To Build A Better Digital Workplace
Enhancing Microsoft Teams To Build A Better Digital WorkplaceEnhancing Microsoft Teams To Build A Better Digital Workplace
Enhancing Microsoft Teams To Build A Better Digital Workplace
 
Masterclass On Improving & Measuring Onboarding, Retention & Wellbeing With M...
Masterclass On Improving & Measuring Onboarding, Retention & Wellbeing With M...Masterclass On Improving & Measuring Onboarding, Retention & Wellbeing With M...
Masterclass On Improving & Measuring Onboarding, Retention & Wellbeing With M...
 
Getting Started & Driving Success With Power Platform At Scale
Getting Started & Driving Success With Power Platform At ScaleGetting Started & Driving Success With Power Platform At Scale
Getting Started & Driving Success With Power Platform At Scale
 
Masterclass On Improving & Measuring Onboarding, Retention & Well-being
Masterclass On Improving & Measuring Onboarding, Retention & Well-beingMasterclass On Improving & Measuring Onboarding, Retention & Well-being
Masterclass On Improving & Measuring Onboarding, Retention & Well-being
 
Piloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

Enterprise Mobility: Microsoft Cloud OS Roadshow

Editor's Notes

  1. HIDDEN SLIDE – Optional title slide with ribbon
  2. Slide 5: The Microsoft Cloud Platform Version: (November 2014)   Note: This slide portrays the key messages of the all-up Microsoft Cloud Platform strategy. The notes below are from an executive “elevator pitch” that you can use as a foundation for creating your own personalized Cloud Platform elevator pitch. You can either focus on our differentiators (e.g. Global scale), or highlight the benefits of the Cloud Platform, such as Data Insights.   Single Slide Pitch Key goal of slide: land what makes the Microsoft Cloud Platform different, unique. Talk track: We understand that there is a lot of competition when you consider all of the productivity, app, and platform players out there. We looked hard at what makes Microsoft unique in this space—we asked customers, partners, analysts, and our own people. What are our points of differentiation? What helps set us apart from the rest? Hard questions, soul-searching questions to find the core of what makes us valuable to you. The big answer that came back was interesting: no other company has a complete and flexible suite of capabilities like Microsoft—and the experience to back it up. Some companies have great productivity capabilities, but don’t have business apps or platform experience. Some companies have great platform expertise but no productivity or apps. A recent IDC report says that 67 percent of customers expect to purchase multiple services from a single cloud vendor. That means that cloud vendors that provide options and multiple services have a decent shot at getting more business. I know you don’t particularly care about that, but it further validated our approach. We want to give you options, choice, flexibility, and back it up with rock-solid performance and security. That’s what Microsoft has been all about since the beginning. Let’s take a moment to look at the five things that make the Microsoft Cloud different—things you should be considering when you’re selecting a cloud vendor.   Global scale: We provide the worldwide reach and hyperscale needed to break the cloud entry barrier giving you better economics, business agility, and availability. This is all of our experience running some of the largest cloud services in the world. You get to benefit from all of that knowledge and our global platform. When you’re ready to scale, we’re ready.   Enterprise-grade: We have proven enterprise experience coupled with security and compliance investments giving you the confidence that your business demands. We’ve been working very hard for decades to become enterprise grade—a badge of honor that we hold dear.   Comprehensive: We provide an unmatched breadth of capabilities that provide IT simplification and the consistency essential for your business transformation. We make it easy to connect things, for example, a unified identity and access management system enabling single-sign on to employees.   Hybrid cloud: This is the big one. We believe it’s critical that we provide flexible cloud services, scalability, and capacity that increase the value of existing technology investments to best fit your business needs. We understand that you can’t start over in the cloud overnight. You need flexibility when it comes to managing and making best use of existing on-premises investments, providing a path to the cloud, and for all of your cloud needs.   People-centered experiences: We’re committed to providing the experiences that end users want, with the control IT needs—designed to produce higher productivity and extend skillsets to cloud for innovation with minimal training costs. With Office, Dynamics, and Azure all working together, your people will be productive and delighted by the integrated experiences that just work. So we have talked about what makes the Microsoft Cloud Platform different. Now let’s spend a moment looking at the benefits, or the outcomes you enjoy when making use of the platform.   Enterprise mobility: This is about all the different devices that are coming into the environment today and helping IT manage the needs of the end users in their environments with the governance and support around policies for devices, data, and users as those devices come into the enterprise. Being able to empower enterprise mobility through a unified view is a very powerful value proposition and what we provide with Microsoft Intune.   Internet of Things: As more and more devices and things across your business are connected, you have an opportunity to dramatically improve performance of assets through predictive maintenance, monitor and optimize your supply chain, or get closer to your customer. With Microsoft, you can create the Internet of Your Things—allowing you to make use of what you already have, connect a wide range of things, and gain the visibility you need.   Application development: The Microsoft Cloud Platform enables application innovation—an important strategy for businesses today to differentiate, whether that includes new mobile customer experiences or a new B2B partner portal, or mixing and matching of SaaS, traditional line-of-business apps, and data to create new views and opportunities for the business. Microsoft provides flexible and enterprise-grade development and cloud environments that get the most from existing resources and assets while making the most of new technologies.   Data management and analytics: Relative to data, Microsoft is focused on helping IT, users (employees), and data professionals easily bring together structured relational data inside the enterprise with unstructured non-relational data from the Web. Big Data from the Web, small data in terms of ERP and CRM and other apps inside the firewalls really means all data. Being able to bring these different data sets together to unlock insights on any data for everyone. We deliver the plumbing through SQL Server and port connected analytics capabilities into familiar tools like Excel in Office and Power BI for Office 365. This opens up BI, which uniquely allows every employee—not just data experts—to access data, combine data sets, and uncover insights to answer questions they’ve never before been able to answer on their own— all without help from experts or IT.   Cloud infrastructure: There is so much complexity in how datacenters run today. IT is largely managing infrastructure and trying to consolidate servers and start virtualization to save money. What we really need to do is transform the datacenter by bringing in automation and enabling organizations to use on-premises resources with the cloud—creating a powerful hybrid approach. We can actually help customers think beyond just managing servers, to managing the pooled resource of compute, networking, and storage that sit in the datacenter and the cloud as a shared delivery service for the business.
  3. Slide 6: Mobility is the new normal   There are a couple of mega trends that have been changing the world of work as many of us know it. The place where people work is no longer exclusively the workplace. People work from home, from cafes, from customer sites, on the road, in the air. In fact people can – and do – work from just about anywhere. Even when they’re in the office, people don’t expect to be sitting at their desk in order to be productive. We are in an era where mobility really is the new normal. The cloud-first, mobile-first world is here. People expect to have the ability to work where, when and how they choose. Using the devices they love and the apps they are familiar with. Just look at the story told by some of these stats: 66% of employees use personal devices for work. A large percentage of employees work away from their desk – even when they are in the office. And BYOD is going to mean a new way of working across apps and data.
  4. Slide 7: What’s driving change?   NOTE: This slide is a build slide – you can either use this build slide or the slide that does not build, which can be found at the end of the deck.   (Build devices) What’s behind this shift in work practices? As I mentioned, there are a couple of mega trends that have taken hold. Firstly, there’s the proliferation of consumer devices – sometimes called the consumerization of IT. Users have a lot more devices to choose from. New form factors. Different platforms. Different sizes, shapes and colors. The net result is that devices become an object of personal choice and users of those devices feel a strong affinity with the devices they use. Try to force a user to settle for a device they don’t love or stop them from using the device they want and you’re asking for trouble. As it stands, over 60% of devices in the workplace are personally owned.   (Build apps and data) Then there’s the cloud. People are always connected. And there’s an app for just about everything. This explosion of low-cost SaaS apps means that if a user can’t find a way to do what they want with the tools IT give them, it’s very easy and cheap to find their own solutions – and so Shadow IT is born. Apps need data – very soon users are finding ways to use not only personal devices but also apps to access corporate data.   (Build user) Finally, there’s a natural shift as a younger generation, a generation that has grown up in this always-connected world, enters the workforce. Your new college graduates are huge social collaborators already and are bringing those connected, collaboration skills to the workplace and expecting an infrastructure that will support them in how they work. Whatever the drivers, the shift has created a tension between what users need and what IT is responsible for. 60% of users think that IT is incapable of providing productivity capabilities while Gartner predicts that by 2016, 20% of BYOD projects will fail because IT has imposed too tight a control on personal devices.  
  5. Slide 8: Microsoft’s unified approach   What’s the role of IT in this new world? Is it to keep users productive? Or secure company assets? To embrace change and turn it into a competitive advantage? Or avoid unnecessary risk? The answer is, of course, all of the above. The buck really does start and stop with IT. But keeping up with such fast moving and changing trends has its own challenges. IT has had to jump-in and fire-fight on several fronts: from getting unmanaged devices on the corporate network under policy to coming up with strategies to avoid sensitive customer data from falling into the wrong hands. All while keeping users happy…   Let’s take a look at what that means for your average user and your average IT administrator. Start with the user. They’re always on the road and works from a number of different devices and locations. They need email on their devices – whether that’s a PC, tablet or phone. They also want apps. LOB apps. Productivity apps. And more recently SaaS apps. The user expects to have access to all the apps they need to stay as productive as possible wherever they are. But they also need to be able to work on documents across devices, so they a way to pull synchronized data from the cloud to be accessed on different devices. And that may mean that they require access to sensitive data while they’re out on the road using a non-corporate device.   For the IT admin, all these scenarios create risk. A certain amount of risk can be tolerated. But as user requirements increase, IT has to take action to ensure the risk is maintained at an acceptable level. This has led to investment in point solutions being deployed to address pain points and risk. However, each point solution adds cost to the business and complexity to IT. And as each point solution has to be integrated with the previous point solutions, the impact is amplified with each new solution. While individual tools to solve individual problems is undoubtedly effective, it may not always be efficient in either cost or time. For example, having one tool to manage PCs and a different tool to manage mobile devices is inevitably going to lead to duplication of certain tasks – and may lead to an inconsistent experience for the end user across different devices. Having one user identity for accessing corporate on-premises applications and a different identity or identities for cloud apps is creating extra work for IT and putting a burden on the user to remember a raft of different login IDs and passwords. By constantly addressing challenges with point solutions, you may be tactically solving a problem, but you are adding cost and complexity to your business. Not just the cost of net new technologies. But also the cost of standing them up, integrating them, staffing and maintaining them.  
  6. Slide 9: Empowering enterprise mobility   Microsoft takes a people-centric approach to enterprise mobility – meaning we focus on productivity and efficiency for everyone – IT and users. We look across user devices, data and application – but always centered on the needs of the users.   Microsoft has a history of providing rich IT-infrastructure solutions to help manage every aspect of enterprise operations. Microsoft’s people-centric solution consists of products and technologies that can help IT departments handle the influx of consumer-oriented technology and the work style expectations of users, thereby helping increase productivity and satisfaction for the people within their organizations. Microsoft’s people-centric IT vision helps organizations enable and embrace the consumerization of IT, addressing the three constant business challenges: Enabling your end users to be as productive as possible by allowing users to work on the device(s) of their choice and providing consistent access to corporate resources from those devices.   Helping IT to protect your data by protecting corporate information and managing risk.   Unifying your environment by delivering comprehensive application and device management from both your existing on-premises infrastructure, including System Center Configuration Manager, Windows Server, and Active Directory, as well as cloud-based services, including Windows Intune and Microsoft Azure.   Let’s discuss each of these areas in more detail.  
  7. Slide 10: Empowering enterprise mobility– introduce pillars   We recognize the need to balance user demands with IT requirements. The desire for greater access to information, with the need to protect corporate assets. The need to work anywhere and on any device with the need to keep users and devices well-managed whatever, whenever and wherever. Our solution for enabling Enterprise Mobility is built on a foundation that builds on existing investments and reducing complexity for both the user and IT. Based on four components that provide a complete solution for managing the challenges of enterprise mobility: Hybrid Identity Mobile Device and Application Management Access & Information Protection Desktop Virtualization We believe that by selecting a single vendor who can deliver an end-to-end solution to enable your Enterprise Mobility strategy makes sense for users, for IT and for your business.
  8. Slide 11: One vendor. Unified solutions.   Many customers have seen success from taking this unified approach to solve a number of different business challenges.   Aston Martin: Founded in 1913, Aston Martin sports cars are synonymous with luxury, heritage, and authentic craftsmanship. They were able to build on investments they had already made to manage the laptops and devices of their highly mobile and distributed workforce. They see benefit from managing all devices through a single console: “It’s one more example of how the interoperability of Microsoft products makes our lives easier.”   Callaway Golf: Like many companies, Callaway Golf had to cut spending due to the global recession of 2009. Callaway needed a way to keep sales people productive by proactively manage sales computers and mobile devices. Our unified solution allows Callaway to maintain revenue flow by keeping salespeople’s computers running.   Mitchells & Butlers: Established in 1898, Mitchells & Butlers runs many of the United Kingdom’s most famous restaurant and pub brands. For them empowering enterprise mobility is about efficiency for their IT staff. By taking a unified approach to management they can remotely manage a total of 20,000 corporate and mobile devices with only two people. So harnessing the power of enterprise mobility can be about cost or time efficiency, about providing a better service or staying at the cutting edge of your industry. Let’s take a deeper look at what Empowering Enterprise Mobility means for your business.  
  9. Slide 12: One user. One identity. Everywhere.   Like the companies we just mentioned, identity is not a nice to have – it’s at the core of an efficient workforce.   To keep their employees as productive as possible, they need to provide a single identity that works across cloud and on-premises assets. With Identity Federation and Single Sign-On Users have one set of login credentials and passwords. And IT is able to more efficiently manage user identity.   And when users do forget passwords, they have the ability to reset their own passwords – reducing the burden on IT and making the user more efficient by being able to resolve the issue quickly.   Security remains paramount. Users have the ability to bring new devices into the enterprise, but IT can validate that devices connecting to the network are owned and controlled by individuals with the appropriate credentials. MFA helps to provide a layer of protection.   Finally, Hybrid Identity provides IT with tools for monitoring suspicious activity on the network such as an employee accessing their expenses account from the San Francisco office at 9am and logging in from Hong Kong 45 minutes later!   Identity is the first part of empowering Enterprise Mobility, but once you have your user identity in place, you can focus on making them productive of the devices they use to get their work done.
  10. Slide 13: Case study – The Walsh Group The Walsh Group Case Study:   The Walsh Group builds skyscrapers, subways, and bridges, and other big things all over the United States. It’s also a leader in using technology to do construction better. Walsh is busy moving significant chunks of its datacenter environment to Microsoft Azure to reduce IT costs and accelerate IT service delivery. Building on the identity and access management foundation of Windows Azure Active Directory Premium, employees and contractors have a much simpler application sign-in experience, and Walsh enhances data safety. Microsoft Azure Active Directory Premium contains a number of features that Walsh is using to both simplify employee and partner access to applications and better secure data: Employees have single sign-on to all Microsoft and non-Microsoft cloud and on-premises applications from a single screen. Employees can reset their own passwords through the self-service password reset capability in Microsoft Azure Active Directory Premium. Walsh receives a high number of password-related help-desk tickets, and this feature lets employees easily reset their own passwords and get back to work faster. “Turning on this feature was a very simple process,” Wirtz says. “We also really like the write-back capability, which means that a password reset made in Microsoft Azure Active Directory is also made in the corresponding on-premises Active Directory.” Wirtz’s team uses the security reporting feature in Microsoft Azure Active Directory Premium to see which employees are using which applications and devices, from where, and how often. “If my account is based on the west coast and I sign in to a device that is on the east coast, Microsoft Azure Active Directory detects that and raises an alert that there may be a problem,” Wirtz says. “We deal with sensitive government contracts, so we need to ensure the security of our data. We watch our mobile devices very carefully, and having security reporting like this built into our directory system is great.” The Multi-Factor Authentication capability in Microsoft Azure Active Directory Premium augments security reporting. After logging on to externally available services by using their user name and password, employees and partners confirm their identity by responding to a phone call or text message. The Walsh IT team also likes the usage reporting feature, which collects data on specific applications that employees use so that the IT staff can better understand the most popular applications and, when appropriate, suggest more secure replacements for user-downloaded applications.  
  11. Slide 14: Hybrid identity – Assign a single identity to a user   While individual tools to solve individual problems is undoubtedly effective, it may not always be efficient in either cost or time. For example, having one tool to manage PCs and a different tool to manage mobile devices is inevitably going to lead to duplication of certain tasks – and may lead to an inconsistent experience for the end user across different devices.   Having one user identity for accessing corporate on-premises applications and a different identity or identities for cloud apps is creating extra work for IT and putting a burden on the user to remember a raft of different login IDs and passwords.    
  12. Slide 15: Hybrid identity – Users need, want access to multiple apps   Our user needs access to apps in order to get her job done. She’s a busy woman. And she uses a lot of different apps. She wants one user name and password for all his different apps. (She certainly doesn’t want IT to know that she has post-it notes stashed all over the place because she can’t remember the 30 variations of logins and password combinations across all her apps)   And it really makes no difference to our user if the apps she needs are on-premises or in the cloud.  
  13. Slide 16: Hybrid identity – IT needs a better identity solution   IT is also very busy. And ideally, IT doesn’t want to be spinning up a separate identity layer for every new application that gets on-boarded. IT also needs a way get a better handle on some of those third-party SaaS apps they didn’t even know about        
  14. Slide 17: Hybrid identity – Synchronize on-premises identity with Azure AD   Using Microsoft’s Hybrid ID to build on the investments the company has already made in on-premises AD, our IT pro can synchronize our User’s on-premises identity and password with Azure AD to create a single user identity for her across cloud and on-premises systems That means our User can now use the same password for both cloud and on-premises apps. And with AAD Premium, the same credentials can be used for third-party SaaS apps too.  
  15. Slide 18: Hybrid identity – Self-service password reset   That’s not all – if our User forgets a password (and that has happened), she doesn’t need to call the helpdesk – there’s a self-service password reset facility. IT can carry on.  
  16. Slide 19: Hybrid identity – Multi-factor authentication for new devices   But Hybrid Identity isn’t just about keeping our User happy – although that certainly helps to make everyone’s life easier. It also gives IT some critical tools to make sure only the people who are supposed to be accessing the systems are doing so. Our User likes to have the latest gadget and as we’ve already seen, wants to access corporate resources across all her devices. IT can create an added layer of authentication to each new device our User adds, getting the system to send a request for authentication to one of her trusted devices, such as a Multi-factor authentication challenge or being required to register the device.  
  17. Slide 20: Hybrid identity – Security reports   Let’s say our User travels a lot and has been known to lose a device or two. Our IT Pro has the peace of mind to know that his Hybrid Identity solution will allow him to spot anomalies in user behavior. Even our User is unlikely to be accessing her expense account from New York at 9am and Bangkok at 10am.  
  18. Slide 21: Hybrid identity - Summary   So, in summary – Hybrid Identity as part of the Microsoft solution for Enabling Enterprise Mobility puts your user at the center of the solution and gives IT an integrated identity management solution that reduces risk across the business.    
  19. Slide 22: Demo
  20. Slide 23: Device choice. Simplified management.   Device management has increasingly become about new form factors. Most companies have solid solutions for corporately owned PCs, but mobile devices and non-domain joined PCs have brought new challenges. And it’s not all about BYOD either.   Increasingly, users have more say over the devices they use for work. In Empire’s case, they were providing the tablets to their workforce. But many organizations have a BYOD policy, or indeed, whether they have a policy or not, personally-owned devices are finding their way into the workplace.   The Microsoft solution offers a way to manage those devices in a way that does not impede the end user’s experience when using the device they love and gives users a degree of control over their own devices through the Intune Company Portal.   Users can enroll their devices and then access apps targeted to them by IT, based on their identity.   Once enrolled, IT can enforce policies and get a view of inventory or hardware and software across their estate.   If a device is lost or stolen, or someone leaves the company or simply wants to stop using a device for work, they can selectively wipe the device of corporate information and remove it from management. For personally owned devices, these actions can be performed by the user through the Company Portal, or by IT from the administrator console. And it’s not just mobile devices – nor do we only manage Microsoft platforms.   Our unified device management includes mobile device management of iOS and Android, as well as Windows Phone 8 and Windows RT. It also manages PCs, so all your devices are covered by one unified management tool.   Flexibility for your users. Devices managed and data protected. Existing investments leveraged.  
  21. Slide 24: Case study – Mitchells & Butlers   Mitchells & Butlers Established in 1898, Mitchells & Butlers runs many of the United Kingdom’s most famous restaurant and pub brands. Behind the great food and memorable experiences served up daily at every Mitchells & Butlers establishment, technology plays a significant supporting role. “We want to take advantage of available tools to enhance customer service and management efficiency,” says Tim Banham, Solution Architect at Mitchells & Butlers. “So we’re performing a technology upgrade across all our sites. As part of the project, we’re replacing pen and paper with mobile devices for our hosts, hostesses, managers, and retail teams.” Mitchells & Butlers distributed iPod touch devices running iOS 6 for its wait staff and Samsung Galaxy Tab 3 tablets running the Android operating system for its front-of-house staff and site managers. “To enable our business strategies, we needed a mobile device management solution,” says Banham. ”In our restaurants and pubs, many employees share one mobile device, so we wanted a flexible management solution to accommodate that scenario.” The company’s IT staff uses Microsoft System Center 2012 R2 datacenter solutions to manage Mitchells & Butlers corporate devices that operate behind its firewall. “Our biggest priority was to find a solution that interoperated with System Center 2012 R2 so that we could manage all our devices from one console,” says Andy Turner, Technical Lead, Infrastructure, at Mitchells & Butlers.”   Solution Mitchells & Butlers chose Windows Intune, the PC and mobile device management service solution from Microsoft that provides both cloud-based and on-premises capabilities. IT staff will use Microsoft Intune to remotely run mobile device management tasks, including software distribution and self-service application delivery. “We looked at Air Watch and Mobile Iron, but Microsoft Intune required no infrastructure, is user-friendly, and connects with the Configuration Manager component of System Center 2012 R2 to offer a single console for both PCs and mobile devices,” says Banham. “We get the device management capabilities we need: we can deploy software to individual devices or collections of devices that we assign to a manager at each site. And Microsoft went out of its way to help us with extra resources, time, and expertise.” In December 2013, Mitchells & Butlers subscribed to 8,500 Microsoft Intune licenses for its mobile devices. Site visits to configure the iPods will commence in spring 2014. The iPods will run an app called iServe, which was developed for the company’s retail teams to take orders and send them to the kitchen. However, Mitchells & Butlers wants to upgrade the iPods to iOS 7.1.1 and is waiting for a version of the app that can run in that environment. “We have delayed the iOS upgrade until we have completed certification testing on the iServe app,” says Turner. “We’ll do site visits to upgrade the iPods to iOS 7.1.1, then enroll the devices in Microsoft Intune, and download the app from our internal company app store. That’s the only site visit we will need. Going forward, we’ll use Windows Intune to manage the devices from our datacenter.” Another app, called iZone Tables is being developed for front-of-house staff. “iZone Tables is a browser-based, hosted app that runs on Android tablets that we plan to manage with Microsoft Intune,” says Turner. “By the end of 2014, we’ll have enrolled 8,500 devices in total.”   Benefits Mitchells & Butlers considers Microsoft Intune a foundational technology solution that will help the company enact its strategic business plans. “Thanks to Microsoft Intune, we can deploy a mobile computing platform that’s key to furthering our reputation for great dining experiences and expanding our business,” says Banham. The company expects the following benefits:   Improved guest experience. Every year, Mitchells & Butlers’ retail teams serve approximately 130 million meals and 410 million drinks. That task will be easier when the mobile device platform is up and running and staff can spend more time talking to customers and less time writing down orders and running back and forth to the cash register and the kitchen. Plus, hosts and hostesses can use iZone Tables to more efficiently process the more than 2.4 million online bookings that the company gets every year, and managers can ensure that equipment is running in peak performance for customers’ comfort. “By using the hybrid model of Microsoft Intune and Configuration Manager, we can remotely manage a total of 15,000 corporate and mobile devices with only a small team,” says Turner. “This is a cost-effective mobile device management solution.”   Gained an extensible mobile device management platform. Now that Mitchells & Butlers has laid the groundwork for a mobile platform for the field, it can use Microsoft Intune to easily deploy more apps to the devices. “This is just the beginning of a new way of working for our retail teams,” says Banham. “By using Microsoft Intune, we can improve staff members’ work experience and guest satisfaction, while reducing IT labor and operational costs. Everyone wins.”  
  22. Slide 25: Mobile device management   We’ve already established who our User is through our Identity work. And we know that she wants access to her apps. And to do that, she uses a range of different devices. She’s got her PC, of course. But she’s also got a couple of tablets – one an iPad and the other an RT device. Our user likes to use the latest devices for both personal and work apps. She’s also had a number of phones – from iPhones to Android to Windows Phone 8. Some of them were supplied by the company. Some she bought herself. Our User doesn’t care who owns the device– she just wants to access his work documents on whatever device she happens to be using. And since some of the devices are her own, she doesn’t really think or care much about management – but she knows that there is some degree of regulation required. So, our User is happy to accept a few corporate policies on her device – as long as they’re not too intrusive – to allow her to access the apps and data she needs.  
  23. Slide 26: Mobile device management   IT needs an efficient way to get each of these devices…many of them not corporately owned…under management. And then they need a way to get all those apps onto our User’s devices. Our IT Pro already has System Center Configuration Manager deployed to manage the PCs in his company. Now, he is able to layer on Microsoft Intune to manage all the mobile devices in his company too – and through the same single console! Happily for IT, Intune has a built in Company Portal that he can customize…once users have enrolled their device to Intune, our IT Pro can apply policies and can use the identity settings he already has in place to target apps to different users based on their identity and the device type they’re using. This means that when our User gets a new device, she simply has to enroll it through the Company Portal and IT’s policies will be applied to that device. Then our User can view all the apps available to her and download them onto her device herself.  
  24. Slide 27: Mobile application management   If we take a closer look at our User’s newly enrolled device, we can see she’s able to maintain a personal experience, organizing her applications as she prefers with all of her apps available in the same place. [click] She has her corporate managed apps—the Office mobile apps she knows and loves. [click] And all of her personal apps that she uses outside of work and maybe even to support productivity with work. Even though our user has all of her apps at hand on her personal device, IT is able to enjoy unparalleled management of the Office mobile apps, so that with Microsoft Intune, our IT Pro has a different perspective on the organization of our User’s personal device. [click] For our IT Pro, there is a clear separation of the managed corporate apps and our User’s personal apps, without affecting the User’s access to apps. By applying policy at the app level, our IT Pro can support mobile productivity as User’s prefer their own devices, but can still protect corporate data and resources through the managed Office mobile apps. The Intune app wrapper allows IT to apply similar policies to line-of-business applications so that access and resources are equally protected through the business’ proprietary apps. Intune offers multiple managed tools to support BYOD so that Users can stay productive within that walled garden of corporate applications.  
  25. Slide 28: Mobile application management   Let’s take a closer look at how app-level policy application can keep company data and information secure. Our User receives a work email through her managed OWA with an attached Excel spreadsheet containing information she needs for a report. Our User can open the attachment in her Excel mobile application to find the information she needs. She then wants to copy the info to add to her report. [click] But when she tries to paste it into her personal notepad, she cannot—the personal notepad is not a managed app and our IT Pro has applied policies that restrict copy, paste, and cut functions within the Office mobile apps on enrolled devices. So our User opens her Microsoft Word mobile app where she is successfully able to paste her information. Now our User wants to save the working copy of her report to OneDrive so that she can access it from her home computer. [Click] Because her personal OneDrive is not one of the managed applications, she’s unable to save it here—IT has applied policies restricting the ability to save to only within managed Office mobile apps. [click] So our User must save her working copy to the managed OneDrive for Business, which means when she does want to work on this report from another device, it will have to be an enrolled device.    
  26. Slide 29: Mobile application management   IT can safeguard against corporate information and resources leaking through User interaction by applying policies to the apps themselves, but with most employees working from multiple enrolled devices, our IT Pro still needs a broader way of protecting access to the corporate applications on any of the User’s enrolled devices. Perhaps our User decides to replace or retire her device, perhaps she leaves the company or just doesn’t want to use the device for work any longer. The Company Portal allows our IT Pro to selectively wipe corporate applications from any device at any time and arrange for automatic selective wipe of corporate apps when a device is unenrolled . And, in the event that our User’s device is lost or stolen, she or IT can completely wipe the device from the same Company Portal. The self-service option can save time, frustration, worry, and IT resources!  
  27. Slide 30: Mobile device & application management   And it’s not just mobile devices – nor do we only manage Microsoft platforms.   Our unified device management includes mobile device management of iOS and Android, as well as Windows Phone 8 and Windows RT. It also manages PCs, so all your devices are covered by one unified management tool.   Flexibility for your users. Devices managed and data protected. Existing investments leveraged.  
  28. Slide 31: Demo  
  29. Slide 32: Right info. Right person. Right device.   We’ve covered off user identity and mobile device and application management. But perhaps the reason that the two previous topics are so important is because it’s users accessing data on their devices that causes risk to the business.   Data getting into the wrong hands can be a costly and embarrassing business. Nobody wants to be Target!   But even less spectacular breaches can damage your business or lead to serious consequences, especially in industries with stringent regulation.   Businesses need to keep their data protected as much as possible – striking a balance between user productivity and data protection. Microsoft’s Access & Information Protection solutions help companies address these challenges.   Let’s start with the ultimate goal: users can work from anywhere on their devices with access to their corporate resources. This can be achieved through native applications for the device platform, web-based applications, and through data sync.   You can enable users to register their devices for single sign-on and access to corporate data with Workplace Join. This allows IT to be able to open up access to applications and data that otherwise would not be available, in return for knowing about the device.   Providing users with access to the resources they need to get their job done means ensuring that users can access corporate applications and data wherever they are on their devices. To further protect data, access can be conditional based on the user’s identity, the device the user is using, and whether the user is inside the corporate network or connecting from an external location. In addition to on-premises resources that need to be accessed, the user is likely to also want to access cloud-based applications and services. So to make this a seamless experience for users, they are provided with a common identity when accessing cloud-based resources, which is enabled by IT through Active Directory Federation Services. As part of the decision to make corporate resources available to users on the device of their choice, you may want to require additional levels of verification. An example is requiring the user to register the device that they are using. When a user registers their device, it becomes known and “trusted” to provide device level authentication. Additional security can be provided by IT creating business-driven access policies with multi-factor authentication, based on the content being accessed.   For Microsoft, Empowering Enterprise Mobility means starting with the user, giving them an identity that follows them on premises and in the cloud; enabling them to be as productive as possible across a range of devices; but all the while ensuring that data is protected.  
  30. Slide 33: Case Study – Menzies Aviation   Menzies Aviation   Menzies Aviation is a global provider of passenger, ramp, and cargo handling services. Through a combination of organic growth, acquisitions, and the development of niche opportunities, Menzies Aviation is now a major force in the international ground handling industry. Operating at more than 132 airports in 34 countries and supported by a global team of more than 17,000 people, Menzies Aviation serves more than 500 airline customers that handle more than 800,000 flights and 1.7 million tons of cargo annually.   Maintaining the flexible, reliable, and secure IT infrastructure that is necessary to support the company’s global operations is an ongoing challenge. Menzies Aviation accomplishes this with a lean IT team of 70 people, 16 of whom work at two data centers in the United Kingdom that are configured in an active-active design. In the aviation industry, data security is paramount. Menzies Aviation must protect confidential customer information, such as timetables, passenger lists, and cargo contents and delivery schedules to ensure passenger and crew safety. Yet Menzies Aviation employees need to access this information from anywhere—servers, desktop computers, portable laptops, mobile devices, and email stores—and share it appropriately. The company’s user access policies must comply with strict aviation and government regulations. In a global, rapidly changing environment with high staff turnover, it’s a challenge for Menzies Aviation to control access to information. To meet this challenge, IT staff has to correctly configure the right security policies for a large number of files stored on eight file servers in the data centers. “Anywhere we can improve our access control mechanism would help us keep our data secure and comply with aviation industry and government regulations,” says Gallington. “We have to make sure that every employee who logs on to any computer can only see the information he or she is supposed to see.” The company decided to investigate the new identity and access management improvements in the latest Windows operating system from Microsoft. They needed to centrally manage employee identity and access to information based on business and compliance needs.   Menzies Aviation leveraged Active Directory as an integral component of Dynamic Access Control which gave them a more flexible and powerful way to manage employee access to files on New Technology File System (NTFS) volumes. Instead of managing file security at the individual file level, Menzies Aviation system administrators were able to save time by defining central file-access policies at the domain level that apply to every file server in the domain. Classification information is automatically saved with the file itself, so that it is directly available for all applications, including the operating system. System administrators can use Dynamic Access Control to improve control over access to file data, including unstructured data, regardless of where the information resides. They can also define and configure centralized audit policies in Active Directory that can be applied across multiple servers.    
  31. Slide 34: Access and information protection   Sitting behind the apps that our User accesses regularly is using is a bunch of sensitive corporate information.  
  32. Slide 35: Access and information protection   It’s IT’s job to keep that information protected at all times. Managing who has access is a great starting point. And features like selective wipe really help – letting IT wipe corporate data while leaving personal data intact.  
  33. Slide 36: Access and information protection   But while our IT Pro wants to make sure our User has everything she needs to be productive while she is out of the office (and to avoid getting any extra calls from Jennifer), IT has to ensure that information only resides where it’s supposed to and is only accessed by those with the right authority to do so.  
  34. Slide 37: Access and information protection   Not so long ago, our User would simply email herself a copy of a sensitive document to her home PC so she could continue to work over the weekend or take it with her on the road. While her work-ethic was admirable, she had very little regard for data protection compliance  
  35. Slide 38: Access and information protection   Luckily, IT can now provide our User with a way to sync documents she’s working on to a secure, centralized location that he can access with any authorized device. Where needed, our IT Pro can restrict the ability to open, modify, print or forward documents using Microsoft Rights Management Services. And where necessary, IT can set conditional policies for which users can access certain information on which device.    
  36. Slide 39: Access and information protection   So our User may be able to get a more sensitive document on her PC while in the office, but won’t be able to access the same document on her iPad at home.    
  37. Slide 40: Access and information protection   We’ll focus on how users can use the devices they select and still be able to access the business applications they need to be productive. And we’ll show how Microsoft helps to provide a consistent experience across all devices.  
  38. Slide 41: Demo
  39. Slide 42: Flexibility and protection   There are some scenarios where data may be so sensitive you never want it on the device. Or you may have apps that need to be platform agnostic, to avoid compatibility issues. In these instances, Desktop Virtualization can offer better security and more flexibility.   There are several reasons businesses consider desktop virtualization. IT professionals invest in this technology for more efficient management user devices, enabling the “Bring Your Own Device” trend, enhanced security and scalability of the solution. From a user’s perspective accessing the same experience from any device anytime is key. The challenges of course are - how do you do that, how do you make your corporate applications available regardless of where users are and make that data available even on unmanaged devices where you don’t have control over the policies that are on there and making sure that the machines are patched? How do you make sure when you deliver applications to those that it’s going to do so in a way that is compliant with your corporate requirements? There are many different VDI solutions in the market. Microsoft VDI is clearly differentiated from other solutions because we provide IT organizations the performance they need with the fastest payoff or in other words without breaking the bank. Microsoft has continuously enhanced its VDI solution to deliver users great experience and empower IT departments and professionals easily setup and maintain a powerful system. In today’s world, IT organizations have a big resource challenge. In most cases, the new IT solutions are justified but IT departments are so overloaded to the extent that deploying and managing systems with limited resources becomes a bottleneck. More difficult and complicated solutions become, it becomes less sustainable for IT organizations to setup and maintain a solution. In most cases, high performance solutions are complex. Microsoft VDI solves this issue by providing IT organizations a VDI solution that is powerful, yet easy to setup and maintain. The solution enables the IT professionals/departments to: Protect against loss and leaks of sensitive corporate data. Centrally administer and manage desktops. Reduce time to deploy applications and updates. On the user side, the Microsoft solution: Enables users to access corporate apps and data from any device and any location Delivers great user experience without compromising corporate compliance. Three deployment choices: RDS can host either Session based desktops, pooled VMs or personal VMs. So customers have the flexibility to deploy the right type of VDI desktop for their users, all from a single platform.   For City of Barcelona, Desktop Virtualization was at the heart of their vision for empowering Enterprise Mobility.    
  40. Slide 43: Case Study – City of Barcelona   City of Barcelona   Barcelona is the capital of Catalonia, Spain, and the second-largest city in the country, with a population of 1.6 million. The City of Barcelona employs approximately 12,000 people   The City of Barcelona sought a desktop virtualization solution that was easy to manage so that it could extend this technology to more employees and use it to deploy new software.   The benefits is was able to reap included: Greater employee productivity Increased IT efficiency Software deployment savings of US$122,000 Enhanced security   Truly encapsulating the essence of the Microsoft vision for empowering enterprise mobility with end users being as productive as possible across a range of devices; data being protected and IT gaining efficiencies by using a centralized solution.  
  41. Slide 44: Desktop Virtualization   There are some scenarios wherein IT doesn’t want corporate resources to be stored on the user devices at all.  
  42. Slide 45: Desktop Virtualization   This could be because corporate resources are so sensitive that IT doesn’t want to risk them being saved to or stored on a local device. Or delivering resources – such as sensitive line of business applications or legacy applications – to a variety of device platforms is no easy task. Our IT Pro’s team does not have enough time to provide native applications to a growing number of platforms.  
  43. Slide 46: Desktop Virtualization   For these instances, IT uses Desktop Virtualization.    
  44. Slide 47: Desktop Virtualization   With this technology, desktops and applications appear as if they are running locally on user devices where as they are centralized back in the datacenter.  
  45. Slide 48: Desktop Virtualization   Our User is working with her iPad again – she needs access to an app that wasn’t designed for the iPad. Not to worry, our IT Pro can deliver remote desktops and applications to the iPad for our User to use – depending on her needs. She can log on and access her corporate desktop or applications through a protected connection. Corporate resources are not sent to or stored to our User’s device, so IT can have peace of mind when it comes to safeguarding the corporate desktops and applications. Desktop Virtualization provides flexibility with different deployment choices. IT can pick and choose different deployment models for different users and needs within his organization. He can deliver session based desktops, personal or pooled virtual desktops. He can use RemoteApp and just deliver applications from his datacenter or from the Azure cloud. We’ve all seen how our User is pretty high-octane. She’s on the road a lot. She has a ton of devices. She uses a lot of different apps – some on premises and some cloud-based. But not all of IT’s users are like that. There is warehouse staff and call-center personnel who don’t need the same rich experience our User needs. For call center workers, IT can use session-based desktops. This helps IT keep data where it’s supposed to be while providing a cost effective solution.  
  46. Slide 49: Microsoft Desktop Virtualization   We’ll focus on how users can use the devices they select and still be able to access the business applications they need to be productive. And we’ll show how Microsoft helps to provide a consistent experience across all devices.  
  47. Slide 50: Demo
  48. Slide 51: Empowering enterprise mobility   To re-cap, empowering enterprise mobility isn’t just about managing devices. It isn’t just about identity or data protection. It’s a unified, people-centric approach that spans identity, devices, apps and data to ensure that users are as productive as possible, data is protected and cost and complexity is reduced.   …Let’s build on your investments   And for most organizations, aligning to the Microsoft strategy means you can build on top of investments you’re already made.   66% of businesses are already using System Center Configuration Manager. There are 240m user accounts in Azure Active Directory And we now see 14 billion Azure AD authentications every week.
  49. Slide 52: …lets you build on your investments   We’ve already touched upon how almost all companies use Active Directory in their businesses. System Center Config manager is the solution of choice for the majority of enterprises for their PC management, and Microsoft Intune is growing fast as a natural extension for managing those born-in-the-cloud devices.